Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 56 (1.881 secs)
You searched for: Recon conference
[1] 2     Next    Last
[movies]RECON 2008 Conference Videos - recon.cx
RECON2008 T01 Pierre Marc Bureau How I learned Reverse Engineering with Storm.avi RECON2008 T02 Bruce Dang Methods for analyzing malicious Office documents.avi RECON2008 T03 Ilfak Guilfanov Building plugins for IDA Pro.avi RECON2008 T04 Thomas Garnier Windows privilege escalation through LPC and ALPC interfaces.avi RECON2008 T05 Nicolas Pouvesle NetWare kernel stack overflow exploitation.avi RECON2008 T06 Cameron Hotchkies Under the iHood.avi RECON2008 T07 Jason Raber Helikaon Linux Debuger.avi ...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security
Downloads: 10,271 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Recon 2005 - All Videos
Recon is a security and reverse engineering conference located in montreal. All videos are encoded in xvid format.
Keywords: Reverse engineering; Recon; Conference; Security
Downloads: 2,548 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Recon 2005 - Ryan Russell - Keynote
Recon 2005 Keynote speach (http://recon.cx) by Ryan Russell
Keywords: recon,Security,Reverse Engineering,Conference
Downloads: 740
[movies]Recon 2005 - Reverse Engineering panel
Reverse engineering panel at Recon 2005(http://recon.cx)
Keywords: Recon,Security,Reverse Engineering,Conference
Downloads: 1,432
[movies]Recon 2005 - Adam Shostack - Anonymous Blogging
Adam Shostack was once Most Evil Genius for Zero Knowledge systems. He is now coordinating a project to set up anonymous blogs for people in repressive nations, and would like to tell the folks attending Recon about it, and get some of them involved. Bio Adam Shostack is a technologist, startup veteran and regular public speaker. He has published papers on the security, privacy, as well as economics, copyright and trust.
Keywords: Recon,Conference,Security,Anonymity,Anonymous,Blogging,Adam Shostack
Downloads: 976
[movies]g4tv.com-video46477: E3 2010 Ubisoft Press Conference: Ghost Recon Future Soldier - G4TV.com
Joel McHale talks to Producer Adrien Lacey to talk about the premise behind Ghost Recon: Future Soldier and how the future of the battlefield will be impacted by technology.
Keywords: G4TV.com videos
Downloads: 4
[movies]Recon 2006 - Spoonm - IDARub - Recon Conference
IDAPython has made a big splash, by embedding the python interpreter as an IDA plugin, and wrapping the IDA SDK for access from python code. I think this was a great idea to allow more rapid development of IDA plugins, and to help write advanced plugins easier. However, I found a few draw backs with IDAPython. Besides preferring a language besides python, I think the plugin architecture could be improved upon, and brought to be network based...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Ruby; IDA
Downloads: 599
[movies]g4tv.com-video46477-flvhd: E3 2010 Ubisoft Press Conference: Ghost Recon Future Soldier - G4TV.com
Joel McHale talks to Producer Adrien Lacey to talk about the premise behind Ghost Recon: Future Soldier and how the future of the battlefield will be impacted by technology.
Keywords: G4TV.com videos; flvhd
Downloads: 4
[movies]g4tv.com-video53354: Ghost Recon: Future Soldier Video from Ubisoft Press Conference E3 2011 - G4TV.com
Ghost Recon: Future Soldier comes out of E3 '11 with some of the best cooperative multiplayer we've ever seen in a first person shooter, detailed in nearly 10 minutes of solid gameplay footage.
Keywords: G4TV.com videos
Downloads: 6
[movies]g4tv.com-video53356: Ghost Recon Online Video From Ubisoft Press Conference E3 2011 - G4TV.com
The E3 2011 trailer for 'Ghost Recon Online' has been revealed Ubisoft, and it looks fantastic. The latest in Tom Clancy's popular first-person military shooter features some innovative online features, give it a look!
Keywords: G4TV.com videos
Downloads: 5
[movies]g4tv.com-video53356-flvhd: Ghost Recon Online Video From Ubisoft Press Conference E3 2011 - G4TV.com
The E3 2011 trailer for 'Ghost Recon Online' has been revealed Ubisoft, and it looks fantastic. The latest in Tom Clancy's popular first-person military shooter features some innovative online features, give it a look!
Keywords: G4TV.com videos; flvhd
Downloads: 8
[movies]g4tv.com-video53354-flvhd: Ghost Recon: Future Soldier Video from Ubisoft Press Conference E3 2011 - G4TV.com
Ghost Recon: Future Soldier comes out of E3 '11 with some of the best cooperative multiplayer we've ever seen in a first person shooter, detailed in nearly 10 minutes of solid gameplay footage.
Keywords: G4TV.com videos; flvhd
Downloads: 19
[movies]Recon 2005 - Jose Nazario - Introduction to network programming with libevent. libdnet and libnids
For some silly reason, people commonly think that libraries like "libpcap", "libdnet", and libnids" are difficult to use, yet they're not. developing skills with these libraries and combining them with "libevent" allows you to develop many networking tools and widgets such as scanners, sniffers, and other recon toolkits. this talk will introduce these libraries and show how they can be combined using event driven programming paradigms...
Keywords: Recon,Security,Conference,python,libevent,libdnet,libnids,programming,network
Downloads: 716
[movies]Recon 2006 - Pedram Amini - PaiMei and the Five Finger Exploding Palm RE Techniques - Recon 2006
There are a slew of languages, tools, interfaces and file formats for various reverse engineering tasks. Making tools play nice together and deciding how to develop new tools is a cumbersome process. The goal of the framework is to reduce the time from "idea" to prototype to a matter of minutes, instead of days. PaiMei was created for personal use and after much debate it was decided to release the majority of the toolkit to the public...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Framework; Python; OpenRCE
Downloads: 1,053
[movies]g4tv.com-video53296: Ghost Recon: Future Soldier Video From Microsoft Press Converence E3 2011 - G4TV.com
The Ghost Recon series makes its return at the Microsoft Press Conference E3 2011. Spotlighting their close Kinect gameplay integration and extensive gun customization system.
Keywords: G4TV.com videos
Downloads: 6
[movies]g4tv.com-video53296-flvhd: Ghost Recon: Future Soldier Video From Microsoft Press Converence E3 2011 - G4TV.com
The Ghost Recon series makes its return at the Microsoft Press Conference E3 2011. Spotlighting their close Kinect gameplay integration and extensive gun customization system.
Keywords: G4TV.com videos; flvhd
Downloads: 12
[movies]Recon 2005 - Andrew Griffiths - Binary Protection Schemes
The presentation will cover various issues regarding: protecting binaries against analysis license code implementation schemes modifications that can be made against a binary watermarking a binary This presentation will mainly focus on the Linux operating system, however, the ideas presented are applicable for other operating systems as well. The presentation is aimed to give a general high level overview with some examples to demonstrate the case in point...
Keywords: Recon,Security,Reverse Engineering,Conference
Downloads: 572
[movies]Recon 2006 - David Hulton - Breaking Wireless... Faster - Recon Conference
Breaking WPA-PSK is possible with coWPAtty, but trying to do so onsite can be time consuming and boring. All that waiting around for things to be computed each and every time we want to check for dumb and default passwords. Well, we're impatient and like to know the password NOW! Josh Wright has recently added support for precomputed tables to coWPAtty -- but how do you create a good set of tables and not have it take 70 billion years? h1kari has implemented the time consuming PBKDF2 step of WPA...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Wifi; Wireless; FPGA; WPA; WEP
Downloads: 932
[movies]Recon 2006 - Woodmann - The Legality of RCE - Recon
The DMCA has been trying to stop the exchange/sharing of information. Specifically, they have tried to stop discussions regarding reverse code engineering and file sharing. Since reverse engineering is a critical part of software development, I will try to explain why the DMCA rules are faulty in regards to reverse code engineering and search engines that provide links to infringing material. Bio Protector of RCE information
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security
Downloads: 520
[movies]Recon 2006 - Bunnie - Disassembling and Patching Hardware - Recon 2006
Many security systems are beginning to rely on hardware-based techniques to raise the difficulty of attacking a system. As a result, a basic understanding of circuit boards and what they mean can often times be helpful. In this session, bunnie will introduce the topic of reading and understanding circuit boards. We will learn what the basic components look like, and how to determine their function in a circuit...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Hardware
Downloads: 1,236
[movies]Recon 2005 - Nish Bhalla - Auditing Source Code
The objective of the talk is to understand the common problems when developing code written in C/C++. It can be used as starting point to identify security problems when writing applications. The overall focus will be on the prevention of security vulnerabilities and the implementation of technical countermeasures. Reviewing code to find vulnerabilities is becoming more and more common. Reviewing code is not only useful from a developers point of view but also from an attacker's point of view...
Keywords: Recon,Security,Auditing,Source Code,Conference
Downloads: 875
[movies]Recon 2005 - Ryan Russell _ Nicolas Brulez - Malware Analysis
One of the most common examples of reverse engineering is malicious code analysis. In order to clean up after, and prevent further infection by a piece of malicious code, it must be analyzed. Such analysis is often used for generating IDS signatures, detemining exploits used (and hence which patches would be required) and writing detection modules for antivirus software. Usually, this must be done in as little time as possible...
Keywords: Recon,Security,Reverse Engineering,Conference
Downloads: 987
[movies]Recon 2011 - Ghetto Tools for Embedded Analysis by Nathan Fain
(Bug: if the video is black use the QuickTime video instead) Automated JTAG/serial scanning, building your own FLASH programmer, re-documenting IC's. Using arduino based scanning tools the techniques shown for hacking embedded devices should be accessible to anyone with basic programming skills. This talk will explain the workflow and toolkit to make analysis of nearly any device more accessible. Every layer of design in a device, from logic to software, requires a means for debugging...
Downloads: 666
[movies]Recon 2006 - Dennis Cox - Network Devices an Insider's View - Recon Conference
This presentation talks about the fact and fiction of today's security devices. It explains how to approach testing the validly of their claims and provides multiple examples of real world products and their weaknesses. Rarely do security engineers look at network products from the creation point of view. Understanding how and why they are created and the limitations of that process can lead to finding security issues quite a bit quicker and easier...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security
Downloads: 431
[movies]Recon 2006 - Ted Unangst - Secure Development with Static Analysis - Recon 2006
Static source code analysis has evolved rapidly in the past few years into a powerful developmental aid. However, many developers' perceptions of static analysis are incorrect. Analysis techniques are more advanced than many people realize, but also not the magic bullet many hope for. Successful utilization and integration of static analysis requires understanding its possibilities and limits. This talk is primarily targeted at security concious software developers and consultants...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Static Analysis
Downloads: 428
[movies]Recon 2006 - Michael Sutton - Fuzzing - Brute Force Vulnerability Discovery - Recon 2006
Michael Sutton - Fuzzing - Brute Force Vulnerability Discovery This presentation will introduce fuzzing and discuss how it can be applied to different classes of vulnerabilities. We will begin by looking at fuzzing from an academic perspective. Most importantly, newly developed open source tools will be demonstrated and released publicly. Two primary audiences will be attracted to this presentation; those wishing to discover vulnerabilities through fuzzing and those who wish to protect against t...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Fuzzing; Fuzz; Vulnerability
Downloads: 815
[movies]Recon 2006 - Luis Miras - Fix Bugs in Binaries - Recon Conference
Don't wait for your vendor to get around to it, fix bugs yourself! There is no need to wait for patches and new (possibly expensive) software upgrades. In many cases fixing bugs in binaries is easier and faster than in the source code. This is especially true considering the complexity of library dependencies and build environments. Some consider "cracking" software protection a form of patching bugs, that is not what this talk is about...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Bugs
Downloads: 418
[movies]Recon 2005 - Matt Shelton - Passive Asset Detection System
Network scanners are a valuable resource in the security practitioner.s toolkit. They are used to actively probe a network in order to generate a snapshot of the current environment. However, they are not without limitations; they can be loud, resource intensive, and the results can be quickly outdated. During this presentation I will discuss how a passive scanner can be used to identify network traffic...
Keywords: Recon,Security,Conference
Downloads: 278
[movies]Recon 2006 - Christopher Abad - Advancements in Anonymous eAnnoyance - Recon
This talk will go over advancements in the technology to circumvent measures put into place to prevent the age old internet pastime of annoying other people. Methods and tools will be presented for breaking audio and visual CAPTCHA systems, taking advantage of lazy registrant authentication, ruining the quality of collaborative content, and defeating spam filters even better than the spammers do and otherwise compromising usability, as well as a few other surprise demos...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Whales
Downloads: 426
[movies]Recon 2005 - Kathy Wang - Using honeyclients to discover new attacks
People who are interested in maintaining situational awareness often deploy honeypots. However, there are whole classes of attacks for which honeypot devices are not very useful, due to their passive nature. Honeyclients are client-based applications that actively seek malicious servers to gather data for further analysis. This talk will focus on honeyclients, how they can be used, and will share interesting data that has been gathered with a honeyclient...
Keywords: Honeypot,Honeyclient,Recon,Conference,Security
Downloads: 771
[movies]Recon 2006 - Fabrice Desclaux and Kostya Kortchinsky - Vanilla Skype - Recon 2006
Skype is a free (as in beer) voice over IP application. Many other VOIP applications exist, but some specific points make Skype very different, such as its peer-to-peer architecture, its ease to bypass firewalls and, last but not least, the impressive level of obfuscation that has been invested to prevent anybody from looking inside the software and its communications. This last point added to its increasing success gave birth to many myths on security issues around it...
Keywords: Recon; Skype; Reverse Engineering; Conference; Montreal; Security
Downloads: 1,756
[movies]Recon 2005 - Cedric Blancher - Attacking WiFi with traffic injection
This presentation aims at showing WiFi trafic injection applications in order to practically demonstrate weaknesses of commonly deployed WiFi environments, aka WEP or open networks such as hotspots, for network itself and also for stations connected to it. A practical point of vue is adopted instead of giving another "WiFi is insecure" theorical brief. The first part will briefly present 802.11 basics so everyone can understand the whole stuff (management vs...
Keywords: Recon,Security,Conference,wifi,wireless
Downloads: 974
[movies]Recon 2005 - Jonathan Westhues - Practical Attacks on a Prox Card
`Proximity cards' are commonly used as high-tech replacements for magstripe cards or metal keys: you hold the card within a few inches of the reader, and the door clicks open. They are interesting because they are routinely used to control access to property or services. These cards contain electronic circuitry that authenticates them to the reader using a radio link. Many such systems are designed with no security at all...
Keywords: Recon,Security,Conference,search
Downloads: 601
[movies]Recon 2005 - Jonathan Levin - The Dark Side of Winsock
The Winsock SPI, or Service Provider Interface, has been a part of Winsock since the advent of version 2.0. It enables providers to extend the Winsock API transparently, by installing their own hooks and chains to application API calls. However, its formidable capabilities are not put to widespread use... aside from spyware. This lecture begins with a brief overview of the Windows TCP/IP Stack - reviewing the terminology, From NDIS to Winsock 2...
Keywords: Recon,Security,Conference,Winsock
Downloads: 643
[movies]Recon 2005 - _Pedram Amini - Process Stalking: Run Time Visual RCE
In today's world, closed-source software dominates the desktop and much of the server room. While a variety of tools and methodologies exist for security research in open-source software, binary analysis remains a mostly unexplored field. Post discovery and 0day vulnerability researchers heavily rely on reverse code engineering (RCE) to accomplish their work. The purpose of this talk is to introduce the art and science of "Process Stalking" to the general public...
Keywords: Recon,Security,Reverse Engineering,Conference,Process Stalker
Downloads: 519
[movies]Recon 2006 - Sharon Conheady - Social Engineering for Penetration Testers - Recon Conference
In recent years, people have become more familiar with the term "social engineering", the use of deception or impersonation to gain unauthorised access to resources from computer networks to buildings. Does this mean that there are fewer successful social engineering attacks? Probably not. In fact, because computer security is becoming more sophisticated and more difficult to break (although this is still very possible) more and more people are resorting to social engineering techniques as a mea...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Social Engineering
Downloads: 747
[movies]Recon 2006 - Alexander Sotirov - Reverse Engineering Microsoft Binaries - Recon 2006
One of the applications of reverse engineering in computer security is the analysis of operating systems and software for which no source code is available. Most commonly the target is Microsoft Windows, and the goal is to find new 0-day vulnerabilities or to understand the full impact of old bugs. Reverse engineering Microsoft software presents numerous challenges. Based on his experience with reversing all Microsoft patches from the last 6 months, the speaker will present a number of technique...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security
Downloads: 1,393
[movies]Recon 2005 - Todd Macdermid - Encrypted P2P and VoIP Spaces with CUTLASS
Users on the internet are doing more and more of their daily work over peer-to-peer applications. Existing protocols such as SMTP and IRC are being replaced by peer-to-peer file transfer, voice chat, and text messaging systems. Unfortunately, the popular protocols are not secure, and the secure protocols are not popular. In this talk, we will talk about the security properties of the existing peer-to-peer systems, as well as describing an open-source system in development, CUTLASS...
Keywords: Encrypted,P2P,voip,CUTLASS,Recon,Conference,Security
Downloads: 328
[movies]Recon 2006 - Alex Ionescu - Subverting Windows 2003 Service Pack 1 Kernel Integrity Protection - Recon
Windows 2003 Service Pack 1 introduces new features into the kernel which protect against previous methods of accessing kernel memory from user mode without the usage of a driver. For example, both the usage of the DevicePhysicalMemory section as well as of the ZwSystemDebugControl APIs has now been completely blocked, meaning that editing kernel memory through physical addresses, installing a callgate or using IDT modifications are not possible methods of violating the ring privilege level...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security
Downloads: 516
[movies]Recon 2005 - Jack Whitsitt - Visual Analysis: 2D Does it Better in Color
IDS Analysts today - as well as anyone else trying to parse large volumes of information - have a significant problem dealing with issues of context and correlation. Looking at thousands of lines of text just doesn't do it for them. Keeping all of the relevant details of the traffic in your head at once is just not efficient (or, in many cases, possible). Visualizing IDS events (as a solution to this problem) is often attempted but never really seems to catch on...
Keywords: Recon,Security,Conference,IDS,visual analysi
Downloads: 370
[movies]Recon 2005 - Fravia - Wizard searching: reversing the commercial web for fun and knowledge
Like a skilled native, the able seeker has become part of the web. He knows the smell of his forest: the foul smelling mud of the popups, the slime of a rotting commercial javascript. He knows the sounds of the web: the gentle rustling of the jpgs, the cries of the brightly colored mp3s that chase one another among the trees, singing as they go; the dark snuffling of the m4as, the different sounds and the rustling of the databases, the pathetic cry of the common user, a plaintive cooing that sli...
Keywords: recon,Security,Conference,search
Downloads: 3,630
[movies]Recon 2006 - Mathieu Desnoyers - Tracing for Hardware, Driver and Binary Reverse Engineering in Linux - Recon Conference
In this presentation, we will introduce the new Linux Trace Toolkit Next Generation (LTTng) kernel tracer and its analysis counterpart, Linux Trace Toolkit Viewer (LTTV), a fully extensible text and graphical trace viewer. We will focus on how these tools can be used in the security field, particularly for reverse engineering. It can be very useful to reverse engineer a software "black box". It can be a driver, a library or a multithreaded application : the tracer can log every interaction betwe...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; LTT; Kernel; Tracing
Downloads: 495
[movies]Recon 2006 - Joe Stewart - OllyBone - Semi-Automatic Unpacking on IA-32 - Recon Conference
The amount of new malware being developed has increased at a staggering rate over the last couple of years. At the same time, executable packing technology has grown to provide malware authors with a myriad of choices in how they pack their malware to evade detection and analysis. This presents a growing problem to analysts who lack the time to learn how each packer works and can be unpacked, but still need to be able to quickly handle anything that comes their way...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Unpacking
Downloads: 451
[movies]Recon 2006 - Fravia - Reversing our searching habits "Power searching without google" - Recon 2006
Reversers, and more specifically web-seekers, are a strange bunch of 'matter of fact' fellows: their most peculiar endowment is the capacity of reversing realities around them... red As a consequence -among many others- they don't buy any advertisement hype (in fact they don't buy advertisements in general), and they don't trust any commercial enterprise, knowing very well that people bent on making money out of the web have no intention whatsoever of spreading knowledge without having seen very...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Searching; Google; Searchlores; Fravia
Downloads: 2,651
[movies]g4tv.com-video46344: E3 2010 Ubisoft Press Conference - G4TV.com
Ubisoft's E3 2010 press conference included a trailer for Assassin's Creed: Brotherhood, Shaun White Skateboarding, Ghost Recon: Future Soldier, and new Rayman and Rabbids games!
Keywords: G4TV.com videos
Downloads: 5
[movies]g4tv.com-video53468: Wii U Games from Nintendo Press Conference E3 2011 - G4TV.com
At the Nintendo Press Conference E3 2011, Nintendo announced a brand new console Wii U with a slew of HD games including: Darksiders 2, Dirt, Ninja Gaiden 3, Metro: Last Light, Aliens: Colonial Marines, Ghost Recon Online and more.
Keywords: G4TV.com videos
Downloads: 3
[movies]Recon 2006 - Anthony de Almeida Lopes and Jack Louis - Multi-cavity NOP-infection OS-Independent x86 Virus. - Recon 2006
This presentation will be about a virus/worm framework which takes advantage of the abundance of NOP-areas produced by modern compilers in executables. The virus is bound to the x86 CPU architecture (with the possibility of porting it to other CISC architectures); however, a key feature of this infection vector is that the virus is operaing system independent. The majority of my work so far has been done on GNU/Linux but tests have been run on Windows XP, NetBSD and FreeBSD...
Keywords: Recon; Reverse Engineering; Conference; Montreal; Security; Virus
Downloads: 433
[movies]Recon 2005 - Thorsten Schneider - Hardening Registration Number Protection Schemes against Reverse Code Engineering with Multithreaded Petri Nets
Registration number protections require the user to enter a registration number to register a software application. However, in most cases such a protection can be defeated easily by an in-depth analysis of the disassembled code or by tracing the applications execution using dynamic disassembly (debugging) techniques. Even there still is heavy use of simple XOR encryption methods, several software applications use high optimized cryptographic algorithms to prove the given input for validity...
Keywords: Petrinet,Reverse Engineering,Recon,Security,Conference
Downloads: 504
[movies]g4tv.com-video53468-flvhd: Wii U Games from Nintendo Press Conference E3 2011 - G4TV.com
At the Nintendo Press Conference E3 2011, Nintendo announced a brand new console Wii U with a slew of HD games including: Darksiders 2, Dirt, Ninja Gaiden 3, Metro: Last Light, Aliens: Colonial Marines, Ghost Recon Online and more.
Keywords: G4TV.com videos; flvhd
Downloads: 113
[audio]onTopic E3 Edition - Microsoft, Ubisoft & EA - Ronnie, Andreas and Craig
On this episode of onTopic Andreas, Craig and Ronnie discuss the Microsoft E3 press conference (Kinect, Fable 3, Black Ops mad MGS Rising) Ubisoft press conference (Child of Eden, Assassins Creed Brotherhood, Ghost Recon and Driver) along with the EA press conference (Bad Company 2, Medal of Honer and Sims 3.)
Keywords: ontopic; ea; microsoft; xbox; gaming; games; awesome; podcast; news; tvandlust; onpause; ubisoft; kinect
Downloads: 280
[1] 2     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio